Showing posts with label security-machine-learning. Show all posts
Showing posts with label security-machine-learning. Show all posts
Wednesday, January 4, 2017
Wednesday, January 6, 2016
Reinforcement Learning
Introduction
Multi-agent reinforcement learning (MARL) algorithms gradually learn good (ideally optimal) strategies with respect to long-term goals through trial-and-error interactions with both the opponent and the unknown dynamic environment.
The Stochastic Game (SG), together with MARL can address the environmental dynamics in security games in a systematic manner.
[2] Improving Learning and Adaptation in Security Games by Exploiting Information Asymmetry, by Xiaofan He. Huaiyu Dai and Peng Ning, in INFOCOM 2015
Reference
[1] A comprehensive survey of multi-agent reinforcement learning, by L. Busoniu, R. Babuska, and B. De Schutter, in IEEE Trans. Syst., Man, Cybern. C, 2008
[2] Improving Learning and Adaptation in Security Games by Exploiting Information Asymmetry, by Xiaofan He. Huaiyu Dai and Peng Ning, in INFOCOM 2015
Saturday, November 14, 2015
Security Data Scientist Resources
[Video] Machine Learning and Big Data in Cyber Security
Source: Machine Learning and Big Data in Cyber Security Eyal Kolman Technion lecture
Speaker: by yal Kolman of RSA given at Technion-Israel Institute of Technoloy, Technion Computer Engineering summer school 2014
Speaker: by yal Kolman of RSA given at Technion-Israel Institute of Technoloy, Technion Computer Engineering summer school 2014
Summary:
- This video discusses about the challenging in applying machine learning to detect attacks.
- It also introduces 3 case studies of how to use machine learning in the domain of security.
Challenges
- High cost of errors
- If the detection generates a lot of wrong alerts, then the detection is not useful.
- Data is not public
- Most of the security data are private
- Semantic gam
- Detection is not enough
- Evaluation difficulty
- There are few labels
- There are few attacks
Case Studies
- Detect inpersonation
- based on users behavior
- locations
- Detect fraud in bank account
- Detect malicious domain
- Events with cookies
- Referral
Subscribe to:
Posts (Atom)